Start Updating rkhunter dat

Updating rkhunter dat

Regarding the warnings about the file properties and commands that have changed, you will need to run the following command after every software update, and after every time you perform a system definitions change: Otherwise, you can't know if the properties have changed due to your own change, or due to malicious behavior.

[] /bin/find [ Warning ] [] Warning: No hash value found for file '/bin/find' in the 'rkhunter.dat' file.

[] /bin/grep [ Warning ] [] Warning: No hash value found for file '/bin/grep' in the 'rkhunter.dat' file.

Use the following workarounds only if you are unable to upgrade immediately.

Some customers have reported successfully avoiding reoccurrences of symptoms by modifying the Agent Update task.

[] Checking version of Gnu PG [ Warning ] [] Warning: Application 'gpg', version '1.4.10', is out of date, and possibly a security risk.

[] Checking version of Open SSL [ Warning ] [] Warning: Application 'openssl', version '0.9.8k', is out of date, and possibly a security risk.

Ich habe einen neuen Server in Betrieb genommen (Suse 11, Plesk 9.0.1, Opteron 4 Kerne, 8GB, 1GB HD Raid1) und mit Watchdog den Security Scan durchlaufen lassen.

Dabei gab es ein paar Warnungen vom RKHunter (auch per E-Mail die Aufforderung zum Prfen).

Performing 'shared libraries' checks Checking for preloading variables [ None found ] Checking for preload file [ Not found ] Checking LD_LIBRARY_PATH variable [ Not found ] Performing file properties checks Checking for prerequisites [ Warning ] /usr/bin/ldd [ Warning ] /sbin/chkconfig [ Warning ] /sbin/ifup [ Warning ] Checking for rootkits...

Performing trojan specific checks Checking for enabled xinetd services [ Warning ] Performing Linux specific checks Checking loaded kernel modules [ Warning ] Checking the network... Performing system boot checks Checking for local host name [ Found ] Checking for system startup files [ Found ] Checking system startup files for malware [ None found ] Performing group and account checks Checking for passwd file [ Found ] Checking for root equivalent (UID 0) accounts [ None found ] Checking for passwordless accounts [ None found ] Checking for passwd file changes [ Warning ] Checking for group file changes [ Warning ] Checking root account shell history files [ OK ] Performing system configuration file checks Checking for SSH configuration file [ Found ] Checking if SSH root access is allowed [ Warning ] Checking if SSH protocol v1 is allowed [ Not allowed ] Checking for running syslog daemon [ Found ] Checking for syslog configuration file [ Found ] Checking if syslog remote logging is allowed [ Not allowed ] Performing filesystem checks Checking /dev for suspicious file types [ Warning ] Checking for hidden files and directories [ Warning ] System checks summary ===================== File properties checks...

Checking system for: Rootkit Hunter installer files: found A web file download command: wget found Starting installation: Checking installation directory "/usr": it exists and is writable. The test will look for known rootkits and generic security issues (such as root access over SSH) and log its findings.

Dzisiaj jest:
30-Oct-2016 01:03

Rozkłady jazdy